Blame doc/functions/gnutls_session_set_verify_cert2
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
@deftypefun {void} {gnutls_session_set_verify_cert2} (gnutls_session_t @var{session}, gnutls_typed_vdata_st * @var{data}, unsigned @var{elements}, unsigned @var{flags})
|
|
Packit Service |
4684c1 |
@var{session}: is a gnutls session
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
@var{data}: an array of typed data
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
@var{elements}: the number of data elements
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
@var{flags}: flags for certificate verification -- @code{gnutls_certificate_verify_flags}
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
This function instructs GnuTLS to verify the peer's certificate
|
|
Packit Service |
4684c1 |
using the provided typed data information. If the verification fails the handshake
|
|
Packit Service |
4684c1 |
will also fail with @code{GNUTLS_E_CERTIFICATE_VERIFICATION_ERROR} . In that
|
|
Packit Service |
4684c1 |
case the verification result can be obtained using @code{gnutls_session_get_verify_cert_status()} .
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
The acceptable typed data are the same as in @code{gnutls_certificate_verify_peers()} ,
|
|
Packit Service |
4684c1 |
and once set must remain valid for the lifetime of the session. More precisely
|
|
Packit Service |
4684c1 |
they should be available during any subsequent handshakes.
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
If @code{flags} is provided which contain a profile, this function should be
|
|
Packit Service |
4684c1 |
called after any session priority setting functions.
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
@strong{Since:} 3.4.6
|
|
Packit Service |
4684c1 |
@end deftypefun
|